|Publication number||US4757536 A|
|Application number||US 06/661,733|
|Publication date||Jul 12, 1988|
|Filing date||Oct 17, 1984|
|Priority date||Oct 17, 1984|
|Publication number||06661733, 661733, US 4757536 A, US 4757536A, US-A-4757536, US4757536 A, US4757536A|
|Inventors||Craig F. Szczutkowski, Satish Kappagantula, Eugene H. Peterson, III|
|Original Assignee||General Electric Company|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (11), Non-Patent Citations (30), Referenced by (57), Classifications (9), Legal Events (6)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This invention relates to method and apparatus for transceiving digital signals. Although generally usable in any transmission media (e.g. wire lines using modems), it finds especially advantageous application over a radio communication channel. In particular, it is related to systems in which digitized cryptographically encoded voice (or other) data signals as well as suitable digital synchronization and/or other digital control signals are transmitted on the same communication channel with the digitized and encrypted voice data signals.
This application is related to other commonly assigned copending applications claiming other inventions contemplated for combined use in the commercial embodiment of this invention:
Ser. No. 661,733, filed concurrently herewith to Szczutkowski et al entitled "Cryptographic Digital Signal Transceiver Method and Apparatus".
Ser. No. 661,598, filed concurrently herewith to Zinser entitled "Hybrid Subband Coder/Decoder Method and Apparatus".
Ser. No. 661,740, filed concurrently herewith to Szczutkowski entitled "Method and Apparatus for Efficient Digital Time Delay Compensation in Compressed Bandwidth Signal Processing".
The disclosure of these related applications is hereby expressly incorporated by reference. Although not required to practice the invention claimed in the present application, the presently preferred exemplary embodiment does utilize these related inventions as will be explained below.
Transceiving digital control and message data signals over radio communication channels is already well known in the art. For example, reference may be had to commonly-assigned U.S. Pat. No. 4,027,243--Stackhouse et al which describes a form of digital message generator for a digitally controlled radio transmitter and receiver in a radio communication system. Provisions are made for acquiring bit synchronization as well as word synchronization (including the multiple transmission of address information in complemented and uncomplemented form) in each of a steady succession of digital command messages transmitted between radio station sites. A modem circuit capable of detecting a 2 out of 3 voted Barker code sync word for frame synchronization is included in the Stackhouse et al system.
Cryptographic encoding of digitized speech signals is also well known in the prior art. For example, the Data Encryption Standard (DES) utilized in the presently preferred exemplary embodiment of this invention is itself well known and more fully described in detail in the following printed publications:
"Federal Information Processing Standards" Publication No. 46, Data Encryption Standard, U.S. Department of Commerce, NTIS, 5285 Port Royal Rd., Springfield, Va. 22161;
"Federal Standard 1027 GSA, Telecommunications, General Security Requirements For Equipment Using DES" available from NTIS or the U.S. Government Printing Office; and
"Federal Information Processing Standards Publication No. 81, DES Modes of Operation" (the "output feedback mode" is utilized in the presently preferred embodiment of this invention), also available from NTIS or the U.S. Government Printing Office.
Typically, as in DES, encoded digital voice signals are transmitted in blocks or "frames" of fixed size along with a progressively changing encryption "vector" which, when combined with appropriate secret "key" digital data, may be used to encode or decode digitized voice data (or any other type of digital data).
It is also known to provide automatic selective signalling within radio communication networks of various types. Sometimes a separate "control" channel is utilized for achieving the desired selective signalling functions (e.g. selection of available communication channels and selection of a desired subset of message recipients within the system).
However, for various reasons, in prior voice privacy systems utilizing digitized and cryptographically encoded voice data signals, truly automatic selective signalling capability is not believed to have been previously available. Nevertheless, it is highly desirable in many radio communication environments to have such selective signalling capability. For example, it may be very useful to selectively address one of plural repeaters that may be within range of a given transceiver which is generating or relaying such an encrypted digital voice message.
It is also believed highly desirable to permit late entry and/or synchronization recovery (both word and cryptographic synchronization recovery) in the context of a digital voice privacy radio communication system having true selective signalling capability.
As explained in Stackhouse et al, a radio frequency communication channel is a relatively noisy and sometimes unreliable environment. Impulse noise, multipath interference and signal fading are typical of the expected problems that must be successfully overcome.
The present invention utilizes a unique format of control and encoded voice digital signals which provides the above set forth desired features especially well in the context of a radio frequency communication channel. It follows, of course, that the same unique format is also advantageous for any other less onerous type of communication channel such as, for example, conventional telephone channels or wire lines (perhaps also using added conventional modems on each end of the channel).
These as well as other objects and advantages of this invention will be more completely understood and appreciated by reading the following detailed description of the presently preferred exemplary embodiment of this invention in conjunction with the accompanying drawings, of which:
FIG. 1 is a schematic block diagram of an exemplary microprocessor controlled radio transceiver in accordance with this invention;
FIG. 2 is a schematic/graphic depiction of an exemplary preferred format or time sequence of the transmitted and/or received stream of digital signals in the exemplary embodiment of FIG. 1; and
FIGS. 3-5 are simplified general flow block diagrams of exemplary computer programs that are embodied in the control program memory devices of the exemplary FIG. 1 system embodiment for the purposes of sync maintenance, acquisition and late entry.
The transceiver of FIG. 1 includes the usual radio frequency transmitter 10 and radio frequency receiver 12 (or any other communication channel transmitter and receiver such as, for example, the transmit lines and receive lines of a conventional wire line modem). As indicated in FIG. 1, the transceiver may be in communication with one or more repeaters or other transceivers or base station(s) over a radio frequency or other fsorm of communication channel. The clear/private switches S1, S2 (typically realized as conventional solid state controlled MUX switches used to switch analog signals under control of digital switch signals) may be provided so that the transceiver can operate in a conventional "clear" mode or alternatively, in the cryptographic or "private" mode. For example, when the switches are in the "clear" mode as shown in FIG. 1, the audio input coming from a microphone and to be transmitted is simply directly connected to transmitter 10 while the output of receiver 12 is directly connected to the usual receiver audio output circuit.
However, when switches S1, S2 are moved to the "private" mode position, then the microprocessor controlled remainder of the FIG. 1 circuitry is switched into operation between the usual receiver audio input/output circuits and the usual radio frequency transmitter/receiver circuits 10, 12. In particular, the microprocessor controlled circuitry will take conventional audio input signals (e.g. from a microphone or audio amplifier or the like) and convert those to a stream of cryptographically encoded digital signals input at switch S1 to the modulator of transmitter 10. On the receiving side, a stream of digital signals arrives via the detector output of receiver 12 and is ultimately decoded and converted into analog audio signals at the lower contact of switch S2 before being passed onto the usual receiver audio output circuits (e.g. audio amplifiers, loudspeakers, etcetera).
In the preferred embodiment, the detector output of receiver 12 is constantly connected to the "private" digital decoding circuits (as shown in FIG. 1) so that the received signal can constantly be monitored. If a switch from "clear" to "private" mode is unexpectedly effected at the transmitter (e.g. initially or in the middle of an ongoing message), then the receiver "private" circuit will automatically begin the requisite decoding process and have decoded audio signals switched to the receiver audio output circuits automatically. This arrangement also makes it possible for the receiving set to automatically switch itself into the "private" mode wherever incoming digital signals are successfully decoded and in fact, this is contemplated for the preferred embodiment.
The overall architecture of the microprocessor control circuits shown in FIG. 1 is generally conventional. In particular, the heart of the system is a control microprocessor 14 (e.g. an Intel 8031 integrated circuit chip). Communication with the remainder of the digital circuitry is via the usual data bus 16 and control bus 18. The usual push-to-talk (PTT) switch 20 may be considered as one wire in the control bus 18 if desired. A manual clear/private mode switch used for selecting the mode of transmitted voice may also be one wire in the control bus 18 if desired. As should be appreciated, there is no need for a manual receive clear/private mode switch when automatic receive mode switching is performed as explained above. The system may include a conventional codec 22 (e.g. an Intel 2916 integrated circuit chip) and conventional speech coding circuits 24 in the form of a suitably programmed Digital Signal Processor (DSP) (e.g. an NEC 7720 integrated circuit chip) for converting audio signals to/from digital-analog form in accordance with known speech digitization and processing algorithms.
In the preferred exemplary embodiment, a hybrid subband coding technique is employed in accordance with the invention claimed in the related Zinser application. There the audio frequency band 180-2900 Hz is split into four octaves with the highest frequency band 1450-2900 Hz being subject to conventional block companded pulse code modulation (BCPCM) and the lower three subbands being subject to conventional adaptive pulse code modulation (APCM) digital bandwidth compression techniques. This plus the novel time delay compensation technique of Szczutkowski permit the speech coding to be carried out using but a single DSP chip 24. However, as should be understood, the use of such speech coding techniques is optional insofar as the presently claimed invention is concerned. The novel message formatting employed in the present invention may be utilized with any desired type of digital speech encoding algorithm or with any type of digital data (e.g. ASCII, etc.).
The Data Encryption Standard is implemented via conventional DES circuits 26 (e.g. an MC 6859 integrated circuit chip) and a conventional DES key memory 28 (e.g. 64 bytes of RAM). Suitable conventional ROM circuits 30 (e.g. 4 kilobytes) are also provided to physically embody the program control structure pertinent to the present invention as indicated in FIG. 1.
The transmit/receive interface circuits 32 are sometimes referred to as "modem" circuits and may also be of conventional design. They preferably include bit restoration circuits of the type described in commonly assigned U.S. Pat. No. 4,382,298--Evans. Although conventional clock recovery and up/down counter circuits can be employed with this invention, it is presently preferred to use the clock recovery circuits described in the copending commonly assigned Evans application Ser. No. 527,471 filed Aug. 29, 1983 and the up/down counter circuits described in the copending commonly assigned Evans application Ser. No. 527,470 filed August 29, 1983. Reference may also be had to the commonly assigned U.S. Pat. No. 4,027,243--Stackhouse et al for digital transmit/receive modem interface circuits suitable for use with radio frequency transmitters and receivers such as transmitter 10 and receiver 12 and for a hardwired Barker code sync word detector. In the preferred exemplary embodiment, the interface 32 may be placed in a "sync search" mode whereupon such a Barker code sync word detector is activated and which thereupon outputs a priority interrupt signal to control microprocessor 14 whenever such a sync word is detected.
A conventional Gaussian Minimum Shift Key (GMSK) filter 34 (e.g. a fourth order low pass Bessel filter having an about 7 kilohertz cut-off measured at the 3 dB points) is preferably included to process the stream of digital output signals before they are passed onto the modulator of transmitter 10 as should be appreciated by those in the art.
The output of receiver 12 (e.g. from an fm discriminator) is also preferably passed through a conventional limiter circuit 36 to eliminate d.c. bias effects that otherwise might be present in the output of the receiver discriminator. For example, the limiter 36 may utilize a simple comparator to compare the instantaneous incoming signal from receiver 12 with a running averaged value over some previous relatively short interval as should also be appreciated by those in the art.
The transmit/receive interface 32 may, for example, on the transmit side comprise a conventional parallel-to-serial shift register for generating a serial stream of digital binary signals to be transmitted. On the receive side, the transmit/receive interface 32 may typically utilize a digital phase locked loop for achieving bit synchronization and a hardwired correlator for recognizing a predetermined Barker code which may be used for achieving word synchronization.
The preferred time sequence of digital signals being transmitted by transmitter 10 or received via receiver 12 is schematically depicted in FIG. 2. This format or time sequence of digital signals is generated for transmission under program control of the microprocessor 14 and, in the receive mode, the control microprocessor 14 is also programmed (e.g. via ROM 30) so as to properly detect and decode the same time sequence or format of digital signals. This unique format permits initial and ongoing frame synchronization, repeater addressing, cryptographic synchronization and selective signalling. All four types of information are repetitively transmitted in a relatively long preamble portion for fade protection (e.g. the usual Raleigh fading which may be expected on radio frequency communication channels) and, in addition, all four types of information are repeatedly retransmitted at regular intervals within the encrypted voice data stream. Fade protecting the preamble by multiple repeats and/or other techniques provides a very high probability of correct initial synchronization and addressing functions. Repeating all four types of information within the voice data stream permits late entry (in the event that the preamble is missed or unsuccessfully decoded) and/or permits recovery of synchronization (in the event that synchronization initially acquired from the preamble is subsequently lost before the end of a given message occurs).
When the transceiver of FIG. 1 is in the "private" mode and the PTT switch is activated, the preamble portion of the format shown in FIG. 2 is first transmitted so as to establish bit synchronization, word or frame synchronization, cryptographic synchronization and addressing (e.g. repeater and/or other selective signalling). Fade protection for deep fading (e.g. up to 45 milliseconds) is preferably provided by multiple repeats of a synchronization sequence as well as the initialization vector (IV) and selective signalling (SS) signals.
The initial "dotting" sequence is merely an alternating 1,0 pattern of digital signals (e.g. 10101010 . . . ) and is continued for a "transmitter wake-up time" (e.g. 25 milliseconds). During this initial "dotting" time, the receiver circuits can quickly obtain bit synchronization. For example, conventional hardwired bit synchronization circuits might be utilized in the transmit/receive interface 32 as previously described so as to automatically obtain and remain in bit synchronization with the incoming serial stream of digital signals. Those skilled in the art will appreciate that logic l's and 0's may be interchanged throughout this discussion since they refer only to two binary levels and not to a rigid voltage polarity or magnitude.
The synchronization sequence next occurs for a time duration equal to the sum of: (a) the maximum expected fade duration, (b) the bit duration required to ensure 99% synchronization acquisition, and (c) the typical time required for repeater turn-on to occur. The exemplary synchronization sequence includes 12 repeats of 48 bit synchronization groups, each of which groups includes a 16 bit synchronization word S (an 11 bit Barker code such as 11100010010 and 5 bits of fill or dotting), an 8 bit "outside address" (OA) repeated once in complemented form (which may alternatively comprise other internal data configurations such as a 5 bit repeater address repeated twice plus filler) to complete a second 16 bit field and a 5 bit sync number (SN) repeated three times (with the second repeat being in complemented form) plus 1 final bit of odd parity code so as to complete the third 16 bit field in a given 48 bit group. At 9600 baud, it requires approximately 60 milliseconds ((48×12)/9600) to transmit all 576 bits of the synchronization sequence in the preamble of FIG. 2.
Once a correct synchronization word S is decoded, the following OA and SN fields may be recognized by requiring that all the vectors within each field (2 in the OA field and 3 in the SN field) match (i.e. taking into account the complemented form of adjacent repeated vectors) to ensure proper frame synchronization and/or that sufficiently error free reception is being enjoyed. (Late entry is differentiated from preamble entry by the format of the OA field.) The proper synchronization number SN is reconstructed by voting 2 of 3 on the three 5 bit vector fields. The synchronization number data SN not only helps establish the current or instantaneous position within the synchronization sequence, it also helps ensure that the correct boundary is identified between the sync sequence and the following IV and SS signal sequence as shown in FIG. 2.
The IV and SS fields follow the synchronization sequence in the preamble of FIG. 2. This second control data sequence includes a 64 bit guard band (GB), a 64 bit initialization vector (IV) and a 16 bit selective signalling address (SS) repeated 9 times in the overall IV and SS sequence of 1296 bits depicted in FIG. 2. The 64 bit guard band GB provides fade protection while the 64 bit IV field is used to establish cryptographic synchronization in accordance with the conventional DES. The 16 bit selective signalling field SS provides group and individual selective signalling capability within a radio communication network.
The IV and SS sequence subsists for a time duration equal to the sum of: (a) the time required for transmitting the initialization vector IV, (b) the time required for selective signalling transmissions SS, and (c) the degree of fade protection desired for the SS/IV control data fields. In the exemplary embodiment, approximately 45 milliseconds of fade margin is provided in the IV and SS sequence of 1296 bits.
The selective signalling vector SS may be used for selective calling of individuals or groups using the same DES cryptographic key. Accordingly, truly selective signalling capability is provided within a cryptographic communication network. The 16 bit SS field may represent, for example, a user group with individual addresses therewithin so that users with the same cryptographic key nevertheless have the ability to further subdivide their calls to subsets or individual transceivers within their particular network. For example, the SS field may also be encrypted to facilitate selective signalling within a group of users having the same DES key while providing no information to a user with a different key (or an evesdropper).
The guard band GB may be used for additional message or signalling capabilities if desired but, in the present exemplary embodiment, it is merely filled with a dotting pattern. 64 bits of dotting was chosen so as to provide a fade margin of approximately 45 milliseconds.
The DES initialization vector IV conventionally contains 64 bits and is a pseudo-randomly generated initialization vector used by the conventional DES encryption algorithm to initialize the cipher-stream generation.
A "five-of-nine" vote is utilized for analyzing the 9 times repeated IV/SS data sequence. For example, at the receiver each of the nine sequential GB/IV/SS data fields is voted bit-by-bit on an at least five-out-of-nine basis. The voted results are stored as used as the correct IV/SS vectors for cryptographic synchronization and selective signalling purposes.
The preamble format of FIG. 2 is chosen so as to provide a 99% probability of correct reception in a radio frequency communication channel experiencing up to about 3% bit error rate (BER). In this analysis, fading is treated as a separate process and dealt with by interleaving redundant data (or left "open" by using all 1's or all 0's, any arbitrary pattern or simply dotted guard bands) along with repeated critical synchronization data as shown in FIG. 2. For example, the FIG. 2 format is designed so as to protect against data losses even though up to about 45 milliseconds of fading may occur on the radio frequency communication channel. The probability of correct reception for the required information is then the product of the probabilities of the individual fields.
Thus if Pch is the probability of the correct preamble reception, then
Pch=(Pcs * Pcoa * Pcsn) *Pcss * Pciv [Equation 1]where,
Pcs is the probability of correct sync S reception;
Pcoa is the probability of correct OA reception;
Pcsn is the probability of correct sync number SN reception;
Pcss is the probability of correct selective signalling SS address reception; and
Pciv is the probability of correct initialization vector IV reception.
Assuming a 3% BER and the FIG. 2 format:
(a) for a repeater receiver or a mobile receiver;
Pcs * Pcoa * Pcsn=0.98964 [Equation 2]
(b) for a mobile receiver (the repeater may not require IV and SS);
Pcss * Pciv=0.99978 [Equation 3]
(c) for the repeater, probability of correct acquisition is
Pcra=0.98964 [Equation 4]
(d) for a mobile, probability of correct reception of the preamble is
Pcma=0.98964 * 0.99978 [Equation 5]
Pcma=0.98845 [Equation 6]
The format of FIG. 2 typically provides:
Initial entry time of about 250 msecs,
Rentry (in case of temporary sync loss)
Late entry capability
Probability of correct detection of the header>99% at a channel BER of 3%
Protection against fades of up to about 50 msecs duration
Falsing rate of less than about once per week.
The output feedback mode of operation of the DES algorithm requires that a 64-bit vector be transmitted at least once per PTT activation. In the preferred embodiment, the 64 bit vector is transmitted once per frame to allow for re-entry or late entry. This vector is different for each transmission thereby constituting 1 out of 264 possible vectors. The vector is called an initialization vector or IV.
The reconstructed SS and IV vectors are tne result of voting at least 5-of-9 on the available group of 9 vectors as previously described. The process of voting at least 5-out-of-9 on the incoming data stream has the effect of improving the effective bit error rate (BER) of the channel. For a given channel error rate Pe, the probability of correct reception where the probability of correct IV and SS reception Pciv*Pcss can be calculated as: ##EQU1##
For Pe=0.03 (3% BER), then Pciv*Pcss works out as 0.99978 or 99.98% probability of correct reception.
Correct sync S (11 bit Barker code) reception is ensured by repeating the 11 bits of the Barker code with a 5 bit fill continuously over a finite period. This time was chosen as the sum of the worst case (expected) fade duration and the time taken to repeat the sync pattern so that the probability of correct reception is at least 99% at a 3% BER.
The probability that 27 bits will be correct at a 3% BER, is simply (1-0.03)27 or 0.439, i.e. the probability that the sync is corrupted is (1-0.439) or 0.561. Thus the probability that the sync is corrupted n times in a row is (0.561)n or the probability of correct sync under these conditions is 1-(0.561)n. This is required to be at least 0.99 in the exemplary embodiment. The value of n satisfying the above equation is at least 8 (12 is used in the exemplary embodiment and is thus more than ample). The probability of correct sync S and OA is 0.99902.
The probability of correct preamble reception under these conditions is Pch=Pcs * Pcsiv=0.99902 * 0.99*0.99978=0.9899=˜0.99.
Following the preamble shown in FIG. 2 are successive data frames, each of which includes a 112 bit header portion and 2040 bits of encrypted voice data. The header includes a single repeat of the sync word S, the outside address OA, the initialization vector IV and the selective signalling address SS. No sync count number SN is provided nor are multiple repeats provided in an attempt to keep the overall data frame length as low as possible (e.g. on the order of 225 milliseconds) and/or to keep the required data processing overhead to a minimum during the time it is necessary to also decode and otherwise process the incoming encrypted voice data.
Nevertheless, by inserting such a header into each data frame, enough information is regularly provided so as to allow for late entry into an ongoing message or conversation and/or so as to reestablish lost frame or cryptographic synchronization (e.g. as might occur from temporary loss of signal or multiple transmitting conditions or the like on a typical radio frequency communication channel). A synchronization maintenance control function in the receiver may thus monitor the ongoing received data frame header. It may permit a certain amount of "free wheeling" even if a bad header is sometimes detected since the critical cryptographic initialization vector IV can be predicted from the previously received (correct) IV. Once cryptographic synchronization has been completely lost, the preferred exemplary embodiment requires two valid received IV's (in consecutive data frames) to be detected before proper cryptographic synchronization is resumed.
As also depicted in FIG. 2, an end of message (EOM) signal is transmitted at the end of a message transmission (e.g. upon release of the PTT switch 20). The EOM signal is continued for about 50 milliseconds in the exemplary embodiment so as to allow for relatively long fades in the received signal while still ensuring that the EOM is properly decoded.
In the format of FIG. 2, the sync word S should preferably preceed the other associated fields (e.g. OA, IV, SS) so as to permit frame sync acquisition before the other fields are to be detected. However, the exact order of the remaining OA, IV, SS fields is essentially a matter of choice.
Those skilled in the art should be able to readily devise transmission control programs for the microprocessor 14 required to assemble and transmit data streams in accordance with the time sequences depicted in FIG. 2. However, since the reception processing control is somewhat more involved, an exemplary embodiment of suitable computer program subroutines is presented in FIGS. 3-5 for causing the microprocessor control system of FIG. 1 to properly receive and decode the time sequence of digital signals depicted in FIG. 2.
The receive control functions required by the digital signal format of FIG. 2 may be divided into two major functional computer program subroutines: (a) a synchronization acquisition subroutine as shown in FIG. 3, and (b) a synchronization maintenance subroutine as shown in FIG. 4. A lower level "late entry" subroutine shown in FIG. 5 is utilized in conjunction with the other programs of FIGS. 3 and 4 so as to permit successful late entry into an ongoing conversation.
A repeated hard-wired test is made for presence of the 11 bit Barker code synchronization word S in the transmit/receive interface 32 irrespective of the private/clear mode status thus enabling automatic reception of either DES encoded digital voice or normal analog voice transmissions. Then, whenever decoded voice is present, the control microprocessor 14 itself automatically switches 52 into a "private" receive mode. A suitable visual or other indicator of this automatically derived "private" mode may also be activated by the control microprocessor. (If desired, the transmit portion of switches S2, S2 may also be automatically switched to the "private" mode in readiness for any return transmission.) As will be recalled, the transmit/receive interface 32 of FIG. 1 is preferably hardwired so as to automatically recognize the appropriate Barker code word and to generate an appropriate priority interrupt signal for the microprocessor 14 which then abruptly switches control to entry point 100 of the sync acquisition subroutine.
Alternatively, the transmit/receive interface 32 may provide a simple multi-bit register through which the incoming bit stream passes and which is periodically sampled by microprocessor 14 at block 102. If the proper Barker code word is not yet received, then the incoming bit stream may be advanced by one or more bits in the interface buffer at 104 and another test made for the proper Barker code at 102. In the preferred exemplary embodiment, the test at 102 should always simply confirm that a proper Barker code sync word is present--since that is the condition upon which control is passed to entry point 100. If not, then the interface 32 is replaced in its sync search mode and control of microprocessor 14 is passed back to higher level programs until the next priority interrupt is produced by interface 32 signifying that another proper sync word S has been detected. As should be appreciated, the interface 32 is preferably wired to inhibit generation of any subsequent priority interrupt until it is again placed in a sync search mode. Otherwise, a priority interrupt would always be generated whenever an incoming S word occurs. It should also be recalled that bit synchronization is typically handled by conventional fixed hardware in the transmit/receive interface 32.
When a correct Barker code synchronization word S has been detected at 102, control passes to 106 where a check is made for a proper outside address OA. In other words, is the OA correct for the particular transceiver site in question? If not, then control is passed to wait loop block 108 where microprocessor 14 now waits for the next sync word S which is tested again at 102.
If both a valid synchronization word S and valid outside address OA are detected at blocks 102 and 106, then a test is made at 110 to determine whether the S and OA data just received comes from the preamble of FIG. 2 or from a data frame header which, in the latter case, would indicate that a late entry is being attempted to an ongoing message. As explained earlier, the OA field includes two 8-bit vectors. In the preamble, the second vector is the logical complement of the first vector. However, in the data frame header the second vector is merely a straightforward repeat of the first vector.
Accordingly, a test may be made at block 110 to see whether the second vector in the just received OA field is inverted. If it is, then exit is made to the late entry subroutine of FIG. 5 as indicated. If not, then a normal sync acquisition from the preamble is indicated and control is passed onto block 112 where a test is made to determine if the synchronization number SN is a valid number (e.g. do the three 5-bit vectors and odd parity code bit check out with respect to one another and, if so, is the indicated sync number less than or equal to 12?). If the sync number SN is not valid, then exit is taken via wait loop 114 back to block 102 to wait for the next valid Barker code synchronization word S.
However, if a valid synchronization number SN is detected at 112, then control is passed to block 116 where the data field boundaries within the preamble are now established (e.g. because one now knows which one of the 12 repeated S/OA/SN fields has just been successfully detected and where it is located in the interface buffer register). The nine repeated GB/IV/SS fields in the IV and SS sequence of the preamble are then received and a vote is taken among the nine repeats of the IV and SS data fields. In the exemplary embodiment, a simple majority vote (e.g. at least 5 out of 9) is taken on a bit-by-bit basis to determine the final IV and SS field values for later usage by microprocessor 14.
After the voted SS field is available, control is next passed to block 118 where the SS field is tested to make sure that it is correct for this particular transceiver/site. If not, then exit may be taken via block 120 where the receiving modem in interface 32 is again placed in the sync search mode where a search is undertaken for the next correct Barker code word.
Finally, if the entire sync acquisition subroutine of FIG. 3 has been successfully completed, then exit from block 118 will be made to begin actually decoding the data frames which follow so as to drive the receiver audio output circuits. However, since the first portion of each data frame in the exemplary embodiment is a header portion which repeats the S/OA/IV/SS fields, exit from the FIG. 3 subroutine may, if desired, simply be taken to the synchronization maintenance subroutine of FIG. 4 where control of the microprocessor 14 normally resides anyway during the ongoing receipt of a succession of data frames.
Upon entry to the sync maintenance subroutine of FIG. 4 at block 200, control is passed to block 202 where the IV and SS fields from the currently received data frame header are read into a buffer register and the just received cryptographic initialization vector IV is compared to the predicted next IV. As will be appreciated by those in the art, the conventional DES algorithm permits one to predict the next IV based upon the previous IV. For the very first data frame, the IV in the header should be the same as the IV already received and voted upon from the preamble. Thus, so as to accommodate the first data frame, an initial housekeeping operation might be performed (e.g. back in the sync acquisition subroutine so as to initially set the predicted next IV to be equal to the voted upon preamble IV).
Additionally, block 202 may include a test for the end of message character EOM since this would be a convenient place to make such detection. If detected, then the interface 32 may again be placed in the sync search mode and control of microprocessor 14 passed back to higher level programs.
The actual comparison of the currently received IV with the predicted next IV is depicted at block 204 in FIG. 4. If the two do not match, then an IV loss is indicated and control is passed to block 206 where a test is made to see if a late entry flag has previously been set (by the late entry subroutine of FIG. 5 to be discussed later). If the late entry flag was set, then exit is taken to block 208 where the current received IV is used to derive a predicted next IV and control is passed back to block 202.
On the other hand, if the late entry flag was not set, then control is passed from block 206 to block 210 where a "loss of IV" counter is incremented. The counter contents is then tested at 212 to see if it is less than or equal to some desired maximum. In the exemplary embodiment, the maximum may be set at a value up to 10. If the "loss of IV" counter has not yet exceeded the maximum permitted contents, then exit is made to block 214 where the currently received encrypted voice data field is decoded using conventional DES algorithms. The decoded results are then conventionally also passed on to codec 22 which drives the analog receiver audio output circuits as should now be appreciated by those in the art and control is passed back to block 202 of the sync maintenance subroutine for processing the next data frame of the incoming message.
If the "loss of IV" counter exceeds the maximum permitted value as tested at block 212, then this indicates a loss of sync and, as a result, the interface 32 is again placed in its sync search mode and control is passed back to higher level programs as indicated by block 216.
Under normal circumstances, when there is no IV loss as tested at block 204, then control is passed to block 218 where a test is made on the late entry flag. If the late entry flag has not been set, then control is passed directly to block 220 where the "loss of IV" counter is cleared (just in case it might have previously accumulated some content) and control is passed onto block 214 where the encrypted voice data field is decoded, etc. as previously described. On the other hand, if the late entry flag was set as tested at block 218, then the late entry flag is reset at block 222 so as to indicate a good late entry sync acquisition. As should now be appreciated, during normal message reception times, control of microprocessor 14 repeatedly passes about the loop comprising blocks 202, 204, 218, 220 and 214.
If exit is made to the late entry subroutine from block 110 of FIG. 3, then control is passed to block 300 of FIG. 5 where the IV and SS fields are decoded and stored from the currently received data frame header. A test is made at 302 to see if the SS field is correct for this particular transceiver/site. If not, then the interface 32 is again placed in its sync search mode and control is passed back to higher level programs as indicated by block 304.
On the other hand, if the SS field is detected as being correct at block 302, then the late entry flag is set at block 306 and the next initialization vector IV will then be iteratively predicted at block 308 in accordance with conventional DES algorithms and a wait loop maintained until the next data frame time whereupon a return is made to the entry of the sync maintenance subroutine in FIG. 4.
To summarize the control algorithm represented by the flowcharts of FIGS. 3-5, initial sync acquisition involves acquisition of the 11-bit Barker code to establish word synchronization. The hardwired interface circuits 32 detect the Barker code word and priority interrupt the microprocessor 14 whereupon control passes to the sync acquisition subroutine of FIG. 3. The repeater address or outside address field OA and the other following fields are then subsequently acquired and temporarily held in a suitable buffer storage. The information thus held in the buffer will have a unique characteristic identifying it as having come from the preamble or from the header of a regular data frame. In the exemplary embodiment, such differentiation is provided by causing the second or repeated vector in the outside address OA field to be inverted in the preamble but not inverted in the header of a regular data field. Thus, a test can be made at block 110 of FIG. 3 to determine whether the incoming S and OA fields originated from a preamble or from the header of a data frame.
If sync acquisition is made during the preamble (as should normally occur), the next occurring 16-bit SN field is grouped into three 5-bit fields and a single odd parity bit field. In the exemplary embodiment, the second 5-bit vector is inverted but otherwise the three 5-bit vectors should match if correctly received and the value of the 5-bit vector identifies which one of the 12 repeated synchronization packets (i.e. S/OA/SN) has just been successfully received. This permits the correct boundary to be established between the 576-bit sync sequence and the 1296-bit IV/SS sequence of the preamble. Once this boundary has been established, then the 9-way redundant GB/IV/SS data stream may be properly framed, received and a majority vote process performed so as to provide a degree of error correction in the resultant initially received IV and SS data fields. The error corrected SS address is then checked for proper identification and, if correct, then the error corrected IV may be used for DES decryption of the encrypted voice data field.
On the other hand, if successful sync acquisition is not made during receipt of a preamble to a message, then a "late entry" situation is indicated. This may occur, for example, because the receiver was somehow "late" in acquiring synchronization either by missing the preamble altogether or by having temporarily lost sufficient RF signal due to a long fade situation in a RF communication channel. In such case, the fields following the OA of the data frame header are the IV and SS fields. If the SS field correctly checks out (i.e. indicating that the message is indeed intended for this particular receiver), then a late entry flag is set and the incoming IV data from the data frame header is stored. This first received IV from a data frame header is not used immediately for voice data decryption but, rather, is used only to predict the IV for the next frame. Thus, a wait is made for the next frame where entry to the sync maintenance subroutine provides the IV received from the next data frame.
If the late entry flag is set, and the predicted and currently received IV's do not match, then the current IV is merely used as the "seed" for the next predicted IV to be used in the sync maintenance subroutine while continuing to inhibit the audio output. Accordingly, in the case of a late entry, two successive correctly received IV's are required before audio output is permitted to occur.
During sync maintenance (for either type of sync acquisition) the just received incoming IV stream is compared to the predicted new IV internally generated in accordance with the DES algorithm. If the late entry flag was set and a good IV comparison is made, then the sync loss counter is cleared and the correct IV may be used to generate a DES decryption vector (e.g. using the DES key from memory 28) in accordance with conventional DES algorithms.
During steady state, the receiver continues to decrypt the encrypted voice stream. Furthermore, if during steady state operation the predicted IV does not properly compare with the currently received IV, a sync loss counter is incremented and when the value exceeds a maximum (e.g. 10), the receiver is assumed to have dropped out of synchronization and attempts are then made to resynchronize the receiver with the incoming data stream. Accordingly, in the exemplary embodiment, once a steady state operation has been achieved, the receiver can "coast" for about 10 data frames (e.g. about 2.25 seconds) before synchronization is considered to have been completely lost.
While only one exemplary embodiment of this invention has been described in detail, those skilled in the art will appreciate that many modifications and variations may be made in the exemplary embodiment while yet retaining many of the novel advantages and features of this invention. Accordingly, all such variations and modifications are intended to be included within the scope of the appended claims.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US3798378 *||Nov 7, 1972||Mar 19, 1974||Itt||Frame synchronization system|
|US3801956 *||Mar 12, 1973||Apr 2, 1974||Motorola Inc||Digital sequence detector using multiple samples during each digit time period|
|US4001693 *||May 12, 1975||Jan 4, 1977||General Electric Company||Apparatus for establishing communication between a first radio transmitter and receiver and a second radio transmitter and receiver|
|US4027243 *||May 12, 1975||May 31, 1977||General Electric Company||Message generator for a controlled radio transmitter and receiver|
|US4249165 *||Apr 18, 1979||Feb 3, 1981||Nippon Electric Co., Ltd.||Digital radio pager|
|US4267592 *||Mar 30, 1979||May 12, 1981||Rockwell International Corporation||Anti-jam radio|
|US4322576 *||Dec 28, 1979||Mar 30, 1982||Racal-Milgo, Inc.||Message format for secure communication over data links|
|US4369443 *||Dec 26, 1979||Jan 18, 1983||Meta Systems, Inc.||Message communication system with message storage|
|US4382298 *||Mar 27, 1981||May 3, 1983||General Electric Company||Binary digit or bit restoration circuit|
|US4418425 *||Aug 31, 1981||Nov 29, 1983||Ibm Corporation||Encryption using destination addresses in a TDMA satellite communications network|
|US4434323 *||Jun 29, 1981||Feb 28, 1984||Motorola, Inc.||Scrambler key code synchronizer|
|1||Barnwell, T. P. et al., "A Real Time Speech Subband Coder Using the TMS32010".|
|2||*||Barnwell, T. P. et al., A Real Time Speech Subband Coder Using the TMS32010 .|
|3||Boddie, J. R. et al., "Adaptive Differential Pulse-Code-Modulation Coding", The Bell System Technical Journal, vol. 60, No. 7, Sep. 1981, pp. 1547-1561.|
|4||*||Boddie, J. R. et al., Adaptive Differential Pulse Code Modulation Coding , The Bell System Technical Journal, vol. 60, No. 7, Sep. 1981, pp. 1547 1561.|
|5||Crochiere, R. E. "Digital Signal Processor-Sub-band Coding", Bell Syst. Tech. J., 60 (Sep. 1981), 1633-1653.|
|6||*||Crochiere, R. E. Digital Signal Processor Sub band Coding , Bell Syst. Tech. J., 60 (Sep. 1981), 1633 1653.|
|7||Crochiere, R. E. et al., "A 9.6 Kb/s DSP Speech Coder", The Bell System Technical Journal, vol. 61, No. 9, Nov. 1982, pp. 2263-2288.|
|8||*||Crochiere, R. E. et al., A 9.6 Kb/s DSP Speech Coder , The Bell System Technical Journal, vol. 61, No. 9, Nov. 1982, pp. 2263 2288.|
|9||Crochiere, R. E., "On the Design of Sub-bands Coders for Low-Bit-Rate Speech Communication", Bell Syst. Tech. J., 56 (May-Jun. 1977), 747-770.|
|10||*||Crochiere, R. E., On the Design of Sub bands Coders for Low Bit Rate Speech Communication , Bell Syst. Tech. J., 56 (May Jun. 1977), 747 770.|
|11||Crochiere, R. E., Webber, S. A. and Flanagan, J. L., "Digital Coding of Speech in Subbands", Bell Syst. Tech. J., 55 (Oct. 1076), 1069-1085.|
|12||*||Crochiere, R. E., Webber, S. A. and Flanagan, J. L., Digital Coding of Speech in Subbands , Bell Syst. Tech. J., 55 (Oct. 1076), 1069 1085.|
|13||Croisier, A., "Progress in PCM and Delta Modulation: Block Companded Coding of Speech Signals", 1974 Int. Zurich Seminar, Proceedings.|
|14||*||Croisier, A., Progress in PCM and Delta Modulation: Block Companded Coding of Speech Signals , 1974 Int. Zurich Seminar, Proceedings.|
|15||Cummiskey, P., Jayant, N. S. and Flanagan, J. L., "Adaptive Quantization in Differential PCM Coding of Speech", Bell Syst. Tech. J., 52 (Sep. 1973) 1105-1118.|
|16||*||Cummiskey, P., Jayant, N. S. and Flanagan, J. L., Adaptive Quantization in Differential PCM Coding of Speech , Bell Syst. Tech. J., 52 (Sep. 1973) 1105 1118.|
|17||Esteban, D. and Galand, C., "Application of Quadrature Mirror Filters to Split Band Voice Coding Schemes", Proc. 1977 Int. Conf. on Acoustics, Speech and Signal Processing, Hartford, CT., (May 1977) 191-195.|
|18||*||Esteban, D. and Galand, C., Application of Quadrature Mirror Filters to Split Band Voice Coding Schemes , Proc. 1977 Int. Conf. on Acoustics, Speech and Signal Processing, Hartford, CT., (May 1977) 191 195.|
|19||Fjallbrant, T. et al., "A Speech Signal ATC-system With Short Primary Blocklengths and Microprocessor-based Implementation", pp. 357-363.|
|20||*||Fjallbrant, T. et al., A Speech Signal ATC system With Short Primary Blocklengths and Microprocessor based Implementation , pp. 357 363.|
|21||Goodman, D. J. and Wilkinson, R. M., "A Robust Adaptive Quantizer", IEEE Trans. Comm., COM-23 (Nov. 1975), 1362-1365.|
|22||*||Goodman, D. J. and Wilkinson, R. M., A Robust Adaptive Quantizer , IEEE Trans. Comm., COM 23 (Nov. 1975), 1362 1365.|
|23||Jakes, W. C., "Microwave Mobile Communications", J. Wiley and Sons, New York, (1974).|
|24||*||Jakes, W. C., Microwave Mobile Communications , J. Wiley and Sons, New York, (1974).|
|25||Jonston, J. D., "A Filter Family Designed for Use in Quadrature Mirror Filter Banks", Proceedings 1980 Int. Conf. on Acoustics Speech and Signal Processing, Denver, CO, Apr. 1977, 291-294.|
|26||*||Jonston, J. D., A Filter Family Designed for Use in Quadrature Mirror Filter Banks , Proceedings 1980 Int. Conf. on Acoustics Speech and Signal Processing, Denver, CO, Apr. 1977, 291 294.|
|27||Max J., "Quantizing for Minimum Distortion", IRE Trans. Information Theory, IT-6 (Mar. 1960), 7-12.|
|28||*||Max J., Quantizing for Minimum Distortion , IRE Trans. Information Theory, IT 6 (Mar. 1960), 7 12.|
|29||Smith M. J. T. et al., "A Procedure for Designing Exact Reconstruction Filter Banks for Tree-Structured Subband Coders", Proceedings of the IEEE International conference on Acoustics, Speech and Signal Processing, Mar. 1984, vol. 2, pp. 27.1.1-27.1.4.|
|30||*||Smith M. J. T. et al., A Procedure for Designing Exact Reconstruction Filter Banks for Tree Structured Subband Coders , Proceedings of the IEEE International conference on Acoustics, Speech and Signal Processing, Mar. 1984, vol. 2, pp. 27.1.1 27.1.4.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US4864616 *||Oct 15, 1987||Sep 5, 1989||Micronyx, Inc.||Cryptographic labeling of electronically stored data|
|US4905302 *||Jun 3, 1987||Feb 27, 1990||General Electric Company||Trunked radio repeater system|
|US4910777 *||Sep 20, 1988||Mar 20, 1990||At&T Bell Laboratories||Packet switching architecture providing encryption across packets|
|US4975952 *||May 11, 1988||Dec 4, 1990||U. S. Philips Corporation||Method of data communication|
|US5007088 *||Feb 27, 1989||Apr 9, 1991||Nec Corporation||Scrambling/descrambling method using a memory for storing initial pseudo-random bit patterns respectively for submultiframes|
|US5070528 *||Jun 29, 1990||Dec 3, 1991||Digital Equipment Corporation||Generic encryption technique for communication networks|
|US5125102 *||Jan 3, 1990||Jun 23, 1992||Ericsson Ge Mobile Communications Inc.||Trunked radio repeater system including synchronization of a control channel and working channels|
|US5150401 *||Dec 4, 1990||Sep 22, 1992||Chips International, Inc.||Retrofittable encryption/decryption apparatus using modified frequency modulation|
|US5161193 *||Jun 29, 1990||Nov 3, 1992||Digital Equipment Corporation||Pipelined cryptography processor and method for its use in communication networks|
|US5185796 *||May 30, 1991||Feb 9, 1993||Motorola, Inc.||Encryption synchronization combined with encryption key identification|
|US5305384 *||Sep 9, 1992||Apr 19, 1994||Chips International, Inc.||Apparatus, system and method for transmitting secure signals over narrow spaced channels|
|US5375171 *||Feb 1, 1993||Dec 20, 1994||U. S. Philips Corporation||Transmission system, and transmitter and receiver used in the transmission system for transmitting and receiving digital signals containing modulated bit allocation information|
|US5408680 *||Aug 11, 1992||Apr 18, 1995||Ericsson Ge Mobile Communications Inc.||Single channel autonomous digitally trunked RF communications system|
|US5488663 *||Aug 4, 1994||Jan 30, 1996||U.S. Philips Corporation||Encoding methods for generating a digital signal containing modulated bit allocation information, and record carriers containing that signal|
|US5563945 *||Feb 28, 1994||Oct 8, 1996||Motorola Inc.||Data storage device|
|US5574788 *||Apr 19, 1995||Nov 12, 1996||Ericsson Inc.||Trunked radio repeater system|
|US5592556 *||Aug 9, 1994||Jan 7, 1997||Ericsson Ge Mobile Communications Inc.||Digital radio with vocoding encrypting codec|
|US5646606 *||Mar 30, 1993||Jul 8, 1997||Wilson; Alan L.||Transmission of transmitter parameters in a digital communication system|
|US5757924 *||Sep 18, 1995||May 26, 1998||Digital Secured Networks Techolognies, Inc.||Network security device which performs MAC address translation without affecting the IP address|
|US5784422 *||Aug 5, 1996||Jul 21, 1998||Transcrypt International, Inc.||Apparatus and method for accurate synchronization with inbound data packets at relatively low sampling rates|
|US5793869 *||Oct 11, 1996||Aug 11, 1998||Claflin, Jr.; Raymond E.||Method and apparatus for encoding and data compressing text information|
|US5864762 *||Aug 22, 1996||Jan 26, 1999||Ericsson Inc.||Operating a trunked communication system in transmission and message trunked modes|
|US5956674 *||May 2, 1996||Sep 21, 1999||Digital Theater Systems, Inc.||Multi-channel predictive subband audio coder using psychoacoustic adaptive bit allocation in frequency, time and over the multiple channels|
|US5974380 *||Dec 16, 1997||Oct 26, 1999||Digital Theater Systems, Inc.||Multi-channel audio decoder|
|US6141533 *||Nov 13, 1997||Oct 31, 2000||Motorola, Inc.||Method and apparatus for a mobile repeater|
|US6151679 *||Jan 21, 1998||Nov 21, 2000||Fortress Technologies Inc. Of Florida||System and method for preventing a first node from being emulated by another node|
|US6240513||Dec 31, 1997||May 29, 2001||Fortress Technologies, Inc.||Network security device|
|US6424689 *||Nov 24, 1998||Jul 23, 2002||Oki Electric Industry Co, Ltd.||Radio communication system, transmitter and receiver therefor|
|US6460137 *||Mar 19, 1996||Oct 1, 2002||Fujitsu Limited||Encryption processing system|
|US6658113||Nov 18, 1997||Dec 2, 2003||Transcrypt International, Inc.||Apparatus and method for concealing data bursts in an analog scrambler using audio repetition|
|US6965995 *||Nov 18, 1999||Nov 15, 2005||Sony Corporation||Signal processing circuit|
|US7230941 *||Apr 26, 2001||Jun 12, 2007||Qualcomm Incorporated||Preamble channel decoding|
|US7430262||Mar 19, 2001||Sep 30, 2008||Defense Ultra Electronics Canada Inc.||Frame synchronization method and system|
|US7620181||Apr 20, 2005||Nov 17, 2009||Harris Corporation||Communications system with minimum error cryptographic resynchronization|
|US7620184||Jul 21, 2003||Nov 17, 2009||Eads Secure Networks||Method for transmitting encrypted data, associated decrypting method, device for carrying out said methods and a mobile terminal for the incorporation thereof|
|US7835523||Aug 26, 2005||Nov 16, 2010||Rockwell Collins, Inc.||Cryptographic engine abstraction layer for a software defined radio|
|US8184607||Jun 1, 2007||May 22, 2012||Qualcomm Incorporated||Preamble channel decoding|
|US8385963 *||Dec 14, 2006||Feb 26, 2013||Nec Corporation||Portable terminal apparatus, its control method, and program|
|US8538002 *||Jun 4, 2012||Sep 17, 2013||Estech Systems, Inc.||Telephone system|
|US8842834||Mar 19, 2007||Sep 23, 2014||Harris Corporation||Robust delivery of packet based secure voice|
|US20020159412 *||Apr 26, 2001||Oct 31, 2002||Odenwalder Joseph P.||Preamble channel decoding|
|US20040120438 *||Mar 19, 2001||Jun 24, 2004||Michel Forte||Frame synchronization method and system|
|US20050013277 *||Jul 21, 2003||Jan 20, 2005||Gerard Marque-Pucheu||Method for transmitting encrypted data, associated decrypting method, device for carrying out said methods and a mobile terminal for the incorporation thereof|
|US20060003760 *||Jul 28, 2005||Jan 5, 2006||Da Tang Mobile Communications Equipment Co., Ltd.||Relay communication equipment, communication method and mobile communication system thereof|
|US20060239458 *||Apr 20, 2005||Oct 26, 2006||Harris Corporation||Communications system with minimum error cryptographic resynchronization|
|US20070223514 *||Jun 1, 2007||Sep 27, 2007||Qualcomm Incorporated||Preamble channel decoding|
|US20080232589 *||Mar 19, 2007||Sep 25, 2008||Harris Corporation||Robust delivery of packet based secure voice|
|US20090233561 *||Dec 14, 2006||Sep 17, 2009||Nec Corporation||Portable terminal apparatus, its control method, and program|
|US20120237015 *||Sep 20, 2012||Estech Systems, Inc||Telephone system|
|EP0446194A1 *||Mar 6, 1991||Sep 11, 1991||Telefonaktiebolaget L M Ericsson||Continous cipher synchronization for cellular communication system|
|EP2044782A2 *||May 2, 2007||Apr 8, 2009||Motorola, Inc.||Processor, method and terminal for use in communications|
|EP2882117A4 *||Jul 31, 2013||Apr 20, 2016||Kuang Chi Intelligent Photonic Technology Ltd||Visible light encryption method, decryption method, communication device and communication system|
|WO1991014315A1 *||Mar 6, 1991||Sep 19, 1991||Telefonaktiebolaget Lm Ericsson||Continuous cipher synchronization for cellular communication system|
|WO2002073848A1 *||Mar 19, 2001||Sep 19, 2002||Cmc Electronics Military Communications Inc.||Frame synchronization method and system|
|WO2008019178A2||May 2, 2007||Feb 14, 2008||Motorola, Inc.||Processor, method and terminal for use in communications|
|WO2008115957A2 *||Mar 19, 2008||Sep 25, 2008||Harris Corporation||Robust delivery of packet based secure voice|
|WO2008115957A3 *||Mar 19, 2008||Nov 13, 2008||Harris Corp||Robust delivery of packet based secure voice|
|U.S. Classification||380/274, 380/261, 370/509|
|International Classification||H04B1/66, H04K1/00|
|Cooperative Classification||H04K1/00, H04B1/667|
|European Classification||H04B1/66S, H04K1/00|
|Oct 17, 1984||AS||Assignment|
Owner name: GENERAL ELECTRIC COMPANY A CORP OF NEW YORK
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST.;ASSIGNORS:SZCZUTKOWSKI, CRAIG F.;KAPPAGANTULA, SATISH;PETERSON, EUGENE H.;REEL/FRAME:004326/0295
Effective date: 19841012
|Jan 3, 1992||FPAY||Fee payment|
Year of fee payment: 4
|Feb 11, 1992||REMI||Maintenance fee reminder mailed|
|Mar 17, 1993||AS||Assignment|
Owner name: ERICSSON GE MOBILE COMMUNICATIONS INC., VIRGINIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST.;ASSIGNOR:ERICSSON GE MOBILE COMMUNICATIONS HOLDING INC.;REEL/FRAME:006459/0052
Effective date: 19920508
|Jan 12, 1996||FPAY||Fee payment|
Year of fee payment: 8
|Jan 11, 2000||FPAY||Fee payment|
Year of fee payment: 12